Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

More Complete, More Specific Thanks to Layered Aproach

By Bill Zalud
March 12, 2002
It’s a different world all right. “Since September 11th, our corporate and commercial customers—who used to be concerned primarily with perimeter protection—are now interested in safeguarding the entire environment,” points out Jerry Boggess, president of Tyco Fire & Security, in an exclusive interview with SECURITY. In a wide-ranging discussion, the Tyco executive proposed end users re-evaluate their security and life safety plans with a “layered look.” “Corporate executives are seeking more comprehensive solutions within each security layer. And if their protective measures are at one level today, they are looking to move up at least to the next level.” Of course, security has been evolv- ing for a long time before last fall.

“Security has changed dramatically over the past decade,” says Boggess. “We’ve gone from a guard system to a disparate system of components to today’s integrated, layering effect. This way, one system builds upon the next to provide a security network that protects an entire business, not just its parts.”

Fire & Detection

Layering fits neatly into the Tyco Fire & Security profile. That operation, with $10 billion in sales last year, employs 95,000 and offers equipment and services in brands including ADT, Sensormatic, Robot, Software House, Simplex-Grinnell, Ansul and Scott Technologies, among others.

The layering bot- tom line, according to Boggess: prevention, detection, notification and suppression.

The foundation layer, and one required by code or insurance, includes fire alarm and burglar alarm systems.

“Equipment here covers contacts, glass breaks, motion and heat sensors as well as smoke detectors and carbon monoxide detectors,” says the Tyco Fire and Security president.

Suppression

Upon that fire and detection layer, there’s fire suppression equipment. The gear here includes fire extinguishers, sprinkler systems, gas and foam suppression and exit notification systems. Across all types of organizations, there is more life safety concern, in the aftermath of the September 11th attacks. Unique technology also is finding its way into the layering equation. For example, the Eagle Imager thermal camera from Scott Health & Safety contains such advanced technology its sensor can detect temperature differences to one-tenth of a degree, permitting clearer, sharper images. Hot spots and victims can be detected as close as two feet away and up to 600 feet away. With its ability to detect very minute temperature differences, firefighters can “see” victims through thick smoke and darkness, according to Boggess.

Video Surveillance

Beyond suppression, the next security layer is video surveillance, comments the Tyco executive. There is a strong installed base out there. Much of it is analog. But “video surveillance is rapidly becoming a totally digital operation. For example, Sensormatic’s Intellex Digital Video Management System allows a user to digitally record surveillance cameras and then instantly search for information using a variety of parameters such as time, date, camera, motion or change in lighting. And with the appropriate software, it is possible to share this video with any corporate officer or security professional with access to a computer on the company’s local area or wide area network.”

According to Boggess, more and more cameras are being purchased and installed, “even in markets that we thought were saturated.”

Access Control

Another layer on top of the others is electronic access control systems that includes card entry, badging and hands-free exit systems, as well as a range of biometrics.

Boggess sees some recent twists on the typical access control system, in the fallout from September 11th. “There are more security executives seeking better ways to control access into their facilities by temporary visitors, as well as ways to better handle packages and deliveries.” The Tyco executive also sees more interest in biometrics, although his firm continues to evaluate and find advantages in a diversity of biometric technologies. No doubt, “rapid growth in the use of biometric devices as part of an access control system will continue at least for the next few years.” For example, according to the Tyco executive, Ireland-based CEM Systems has integrated iris scan technology into its Access 2000 system now in use in more than 20 British Telecommunications sites in Northern Ireland, as well as a number of airports in the United Kingdom.

Personal Protection

A final layer is one that some security executives may not have explored as completely as the others—until now. The personal protection layer, at least to Boggess, covers gear and technology as varied as gas masks and personal response devices, wearable pendants that call help at the press of a button.

Within the Tyco family, Scott Health & Safety has developed and manufactures self-contained breathing apparatus, air-purifying devices and gas/vapor monitoring instruments. “Military operations and post offices around the world are buying these products in huge numbers,” adds Boggess.

Central Monitoring

Holding the layers together and taking security to yet another level is central monitoring. Concludes Boggess, “Through the use of a central monitoring station, each of the security layers can be monitored to provide a higher level of protection.”

A properly monitored system can be an effective force in preventing any variety of incidents. And security professionals—as well as the security equipment itself—are available to handle notification and instructions to get employees out of harm’s way as quickly as possible, as well as alert proper authorities to take action if necessary.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing